Project 2 Implementing A Tenable Nessus Vulnerability Scanner
Project 2 Implementing A Tenable Nessus Vulnerability Scanner
Introduction
1. Wait for the scan to complete (this may take some time
depending on the size of the target environment).
2. View the results:
o After the scan, go to the Results tab to see the detected
vulnerabilities.
o Vulnerabilities are listed with their severity: Critical,
High, Medium, Low.
3. Analyse the vulnerabilities and note:
o Severity level.
o The number of occurrences.
o Potential impact (e.g., exploitation details, system
exposure).
Step 6: Generate and Download Nessus Report